At this year's Galaxy Note8 Hackathon, attendees showed off their creative application design skills to address B2B challenges.Continue readingSamsung and Women Who Code Host First-Ever B2B Galaxy Note8 Hackathon
Addressing federal cybersecurity concerns starts with a common understanding of concepts, as well as private sector collaboration.Continue readingFederal Cybersecurity Begins With a Common Strategy
Mobile phones don't have to be a security risk. Learn how a security platform built from the chip up can…Continue readingSafe and Sound: Here’s How Samsung’s Knox Keeps Your Mobile Data Secure
How can your enterprise get past legacy silos and departments when it comes to creating a new mobile security training…Continue readingBreaking Through Enterprise Silos for Mobile Security Training and Implementation
Mobile security management in federal government is more important than ever. Follow these best practices to safeguard your organization against…Continue readingMobile Security Management: 4 Best Practices for Federal Government Agencies
Biometric authentication is increasingly viewed as a more secure alternative to traditional passwords and passcodes for business users.Continue readingWhich Biometric Authentication Method Is Most Secure?
By complying with DoD standards, Samsung Knox is able to deliver a military-grade phone without sacrificing productivity.Continue readingA Military-Grade Phone: How DoD Standards Helped Hone the Samsung Knox Security Platform
Although the fingerprint unlock is one of the most widely used authentication methods for smartphones, some experts caution that PINs…Continue readingAuthentication Methods Experts Recommend PINs Over Fingerprints